Auth; almost every application employs it. From verifying that a user is who they say they are, to restricting access to a protected resource. If your application isn’t secure, there’s a lot to lose. Let’s learn the difference between authentication and authorisation, and the best ways to implement them.

Comments

Comments are closed.

Joe Theuerkauf at 15:29 on 5 Nov 2022

Literally an introduction talk - it's all about the concepts, not demonstrations or even the mechanics of it. But in that purpose the info is clearer and helpful. i look forward to next-level talks to help me drag my legacy code forward into the "simplicity" that Oauth2 brags about.